Windows 权限提升 BadPotato
☆14Jun 12, 2021Updated 4 years ago
Alternatives and similar repositories for pwncat-badpotato
Users that are interested in pwncat-badpotato are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago
- YonyouNC RCE☆13Dec 2, 2020Updated 5 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PowerShell Constrained Language Mode Bypass☆298Jan 31, 2021Updated 5 years ago
- ☆16Apr 14, 2020Updated 6 years ago
- burp插件:python版,token防重放绕过☆19Jan 16, 2021Updated 5 years ago
- 通达oa下载 http://www.tongda2000.com/download/2019.php☆15Mar 18, 2020Updated 6 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 安服面经☞渗透测试/代码审计/安全研究☆28May 3, 2022Updated 4 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- 用bat脚本在windows环境下,一键免杀shellcode☆27Mar 6, 2022Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- 内存加载DLL 支持VMP最大加密☆12Aug 11, 2020Updated 5 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- ☆39Dec 4, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fully Functional MS17-10 EternalBlue Exploit Written in C++ on windows for windows☆13Sep 6, 2020Updated 5 years ago
- MS17-010 scanner / exploit☆14Jan 5, 2020Updated 6 years ago
- PowerShell script to generate user accounts in Active Directory for a test lab environment☆31Oct 21, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Dec 13, 2021Updated 4 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 4 months ago
- Python script for auto remove AV☆45May 20, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆46Aug 16, 2024Updated last year
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- C# .NET Assembly to perform LDAP Queries☆28Apr 1, 2021Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 8 months ago
- CobaltStrike Extentions☆40Oct 24, 2021Updated 4 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago